2020
DOI: 10.1007/s41635-020-00100-2
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…Firstly, the dataset and experiment conditions are very varied among different works. For example, [31], [7], [32], [2] papers propose various ideas to locate the HT nodes in the circuit, and they demonstrate promising [34] Pre-S Yes No High Low HT localization with 97.3% accuracy and less than 2% false positive Code analysis [5] Pre-S Yes No Low Low Activity estimation with less than 2% error to flag low-activity as HT VeriTrust [32] Pre-S Yes No Low Low HT localization with 100% recall and 11.5% precision FANCI [7] Pre-S Yes No Low Low HT localization with 100% recall and less than 8% false positive UCI [31] Pre-S Yes No Low Low HT localization with 100% recall and 7.5% precision Symbolic algebra [2] Pre-S No No High High HT localization with 100% recall and 74% precision Thermal map [3] Post-S results on their limited sets of benchmarks. However, each one reveals the shortcomings of the former method against distinct Trojans.…”
Section: B Comparing Ht Localization Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Firstly, the dataset and experiment conditions are very varied among different works. For example, [31], [7], [32], [2] papers propose various ideas to locate the HT nodes in the circuit, and they demonstrate promising [34] Pre-S Yes No High Low HT localization with 97.3% accuracy and less than 2% false positive Code analysis [5] Pre-S Yes No Low Low Activity estimation with less than 2% error to flag low-activity as HT VeriTrust [32] Pre-S Yes No Low Low HT localization with 100% recall and 11.5% precision FANCI [7] Pre-S Yes No Low Low HT localization with 100% recall and less than 8% false positive UCI [31] Pre-S Yes No Low Low HT localization with 100% recall and 7.5% precision Symbolic algebra [2] Pre-S No No High High HT localization with 100% recall and 74% precision Thermal map [3] Post-S results on their limited sets of benchmarks. However, each one reveals the shortcomings of the former method against distinct Trojans.…”
Section: B Comparing Ht Localization Methodsmentioning
confidence: 99%
“…Due to exclusive definition of HT, later [6] defeats [31] and [32] and [7] get bypassed by the new HT attack [33]. [5] proposes a framework to analyze RTL codes using word-level statistics of the inputs. It locates the arithmetic blocks with rare nets to be reviewed as candidates vulnerable to HT and can only identify HTs that are always on or triggered by current inputs.…”
Section: B Hardware Trojan Localizationmentioning
confidence: 99%
See 1 more Smart Citation
“…S.A. Islam et al. [14, 15] presented an HT vulnerability analysis for the macro block in the RTL design based on rare triggering nets’ estimation. Zhengfei Jin et al.…”
Section: Introductionmentioning
confidence: 99%
“…Choo et al [13] proposed the Minimum Redundancy Maximum Relevance feature selection to improve the effectiveness of RTL Trojan features. S.A. Islam et al [14,15] presented an HT vulnerability analysis for the macro block in the RTL design based on rare triggering nets' estimation. Zhengfei Jin et al [16] proposed the RTL nodes' partition method and novel features, applying the random forest algorithm to detect RTL Trojans effectively.…”
Section: Introductionmentioning
confidence: 99%